* The mainline version of GRUB2 has a [http://grub.enbug.org/CoreBoot wiki page on the coreboot port] (Update: no longer available)

+

To enable serial, add the following on top of your grub.cfg:

−

* Additional information about our former GRUB2 effort (which was part of Google Summer of Code 2007) can be found in the history of this page. Don't expect any link there to work.

+

serial --speed=115200 --unit=0 --word=8 --parity=no --stop=1

−

* As an alternative, you could consider using [[FILO]]. Both FILO and GRUB2 have various advantages and disadvantages. Which of the two is better suited depends on your requirements.

+

terminal_input --append serial

−

* Yet another alternative is to not put GRUB into the BIOS ROM, but have it run from your disk as you would with a vendor BIOS. For that, you can use [[SeaBIOS]] as payload, which will then be able to run either GRUB1 or GRUB2 from your disk.

+

terminal_output --append serial

−

+

−

+

−

== Compiling GRUB2 for being use as a payload ==

+

−

See [[Talk:GRUB2]] and [https://lists.gnu.org/archive/html/grub-devel/2011-06/msg00003.html here] for more details.

Then you can put the key on the memdisk (advised) or the boot partition for test purposes only.
Then in GRUB do (for testing purposes):

trust boot.key
set check_signatures=enforce

to only boot correctly signed kernels and initramfs...

Then load kernel and initramfs as usual...

Trisquel, Ubuntu, Debian

We want automatics hooks to sign our kernel so we don't have to do it manually each time...
The following howto was tested on trisquel 6
Generate the key as root(sudo su) like we just explained, but without a password
In debian based distributions you can hook the kernel build to sign the result:
Add the following to /etc/kernel/postinst.d/yy-update-signatures